Research the topic and discuss how the fraud occurred. Assess the effectiveness of the company’s internal controls and recommend accounting information system (AIS) controls that will mitigate the risk of future attacks. Ensure your recommendation is in compliance with industry standards.
TOPIC: A 17-year-old hacker broke into the Bell Laboratories network, destroyed files, copied 52 proprietary software programs, and published confidential information on underground bulletin boards. Many hackers are young, some as young as 12.